A Remote Code Execute Vulnerability in the modem of the ISP

Today, I want to share with you how I successfully exploit the modem of an ISP in Vietnam. I found the multiple vulnerabilities in the GPON firmware, all of them belong to the web portal of the modem. That means it can only be exploited from a client which joined in LAN or it can be triggered by a CSRF in LAN. Anyway, I don’t wanna magnify this stuff.

Continue reading

Tell me your bank account number, I’ll show you the rest detail

THIS FLAW HAS BEEN FIXED BY THE OWNER AT THE TIME THIS POST IS PUBLISHED. THE CONTENT IS FOR KNOWLEDGE SHARING PURPOSE TO PREVENT THIS FLAW HAPPEN AGAIN


Retail bank industry is booming in Vietnam recent years. Many banks invest for retail business through improve customer service. Mobile banking is one of the hot topics, every bank already had or soon to have mobile banking and mobile apps for their customers use. Winter season is nebulous in Vietnam and the repetitive company work make me so bored. I need a fresh air. Luckily, a commercial bank contacted us for help them idetify the security risks on their mobile application  (iOS, Android) and I took care of it.

Continue reading

Flaw on a custom software puts million users data at risk

It was a Friday of last May. A client pulled me from the air conditioner to meet him. His department took over the website’s company from another team. His company is service provider and the website is a portal that is serving over 1 million customers natonalwide. Through the portal, user can view their spend . And he needs the support from us to penetrate the security matters of the portal: finding the security weakness, showoff the data leakage if any and suggest the solution.

Continue reading

Kiểm thử bảo mật và đánh giá an toàn thông tin

(English caption below)

Q: Gần đây tôi nghe nhiều người nhắc tới thuật ngữ Pentest, kiểm thử bảo mật, thuật ngữ đó nghĩa là gì vậy chị?
A: Pentest là hoạt động đánh giá sức khỏe của hệ thống thông tin dựa trên kỹ thuật thử nghiệm tấn công hệ thống. Hệ thống có thể hiểu là website, máy chủ, mạng,… và thậm chí cả con người. Continue reading

PyAna

Shellcode analysis is not trivial. Static analysis is ineffective and easily to be defeated. Moreover, static analysis tools are usually not free. Dynamic analysis requires the shellcode to be loaded into another process in an appropriate environment, which is often a virtual machine.

In this presentation we introduce PyAna, a new tool that aims to make it easier to analyze shellcode. PyAna uses the Unicorn framework to emulate CPU, and creates a virtual Windows process, into which the shellcode is injected and analyzed. This allows automating the analysis, and provides a flexible and light-weight environment without requiring virtual machines.

Continue reading

Initial Winnti analysis against Vietnam game company

Abstract:

The malware, designed by human, often inhabits the servers to steal the information and to destroy the computer systems.

This analysis aims to find out, in the case of the company (real name is not exposed by the permission), how the malware infected the server, and to assess the malware’s relationship with external objects.

Continue reading